Search Results for: export+import

RBI and Government should not drift in deciding about Bitcoin regulation

Bitcoins are internationally exchangeable into foreign currency of different countries and to some extent even in India. Hence at a time when the Government may be trying to force foreign Governments to share information on Benami Bank accounts in foreign … Continue reading

Posted in Cyber Law | 1 Comment

The e-sign conundrum

(P.S:  This post tries to explain the “e-sign” system of authentication of an electronic document as per the provisions of Information Technology Act 2000 as amended in 2008 -ITA 2000/8, for the benefit of students and teachers of Cyber Law.  … Continue reading

Posted in Cyber Law | 1 Comment

RBI does a Modi on Bitcoin

This Christmas has been a real merry Christmas for India…. and also Pakistan. In a stunning move which stunned everybody from his supporters to detractors, Indian PM Mr Narendra Modi dropped in at Lahore wished happy birthday to the Pakistani … Continue reading

Posted in Cyber Law | 2 Comments

Inconsistencies in the CCA guidelines need to be clarified

I recall my earlier article titled “Is it a WhatsApp Moment or Napster Moment for Indian Financial System?”  in which I had pointed out certain doubts about the legality of the new Electronic Signature system that was notified by the … Continue reading

Posted in Cyber Law | Leave a comment

Rs 197 crores lost by ONGC to a silly Cyber Fraud

Two years back we wrote the following posts: RBI and ECGC should consider trade remittances to Hong Kong as Highly Risky : July 14, 2013 Syndicate Bank loses Rs 1.13 crores of customer’s money: November 26, 2013 Negligence of Export Promotion … Continue reading

Posted in Cyber Law | 1 Comment

Encryption is the Key to Information Security

The recent faux pas committed by the Department of IT, Government of India in publishing a half-baked policy as the “Draft National Encryption Policy” created a needless controversy on the topic of “Encryption Policy” itself and whether it was required or … Continue reading

Posted in Cyber Law | Leave a comment